CVE-2023-53993Missing Release of Resource after Effective Lifetime in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: PCI/DOE: Fix memory leak with CONFIG_DEBUG_OBJECTS=y After a pci_doe_task completes, its work_struct needs to be destroyed to avoid a memory leak with CONFIG_DEBUG_OBJECTS=y.

Affected Packages4 packages

Linuxlinux/linux_kernel6.0.06.1.24+1
Debianlinux/linux_kernel< 6.1.25-1+2
CVEListV5linux/linux9d24322e887b6a3d3f9f9c3e76937a646102c8c12a0e0f4773fe8032fb17e56f897bee32ce3cdc2b+3
debiandebian/linux< linux 6.1.25-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-53993: In the Linux kernel, the following vulnerability has been resolved: PCI/DOE: Fix memory leak with CONFIG_DEBUG_OBJECTS=y After a pci_doe_task complete2025-12-24
OSV
PCI/DOE: Fix memory leak with CONFIG_DEBUG_OBJECTS=y2025-12-24
GHSA
GHSA-4vfj-wgm2-99m2: In the Linux kernel, the following vulnerability has been resolved: PCI/DOE: Fix memory leak with CONFIG_DEBUG_OBJECTS=y After a pci_doe_task comple2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: Kernel: Denial of Service due to memory leak in PCI/DOE2025-12-24
Debian
CVE-2023-53993: linux - In the Linux kernel, the following vulnerability has been resolved: PCI/DOE: Fi...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-53993 Impact, Exploitability, and Mitigation Steps | Wiz